International Conference on Detection of intrusions and malware, and vulnerability assessment最新文献

筛选
英文 中文
Spearphishing Malware: Do We Really Know the Unknown? 鱼叉式网络钓鱼恶意软件:我们真的了解未知吗?
Yanko Baychev, Leyla Bilge
{"title":"Spearphishing Malware: Do We Really Know the Unknown?","authors":"Yanko Baychev, Leyla Bilge","doi":"10.1007/978-3-319-93411-2_3","DOIUrl":"https://doi.org/10.1007/978-3-319-93411-2_3","url":null,"abstract":"","PeriodicalId":268358,"journal":{"name":"International Conference on Detection of intrusions and malware, and vulnerability assessment","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-06-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122246364","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
MemScrimper: Time- and Space-Efficient Storage of Malware Sandbox Memory Dumps MemScrimper:时间和空间效率存储的恶意软件沙箱内存转储
Michael Brengel, C. Rossow
{"title":"MemScrimper: Time- and Space-Efficient Storage of Malware Sandbox Memory Dumps","authors":"Michael Brengel, C. Rossow","doi":"10.1007/978-3-319-93411-2_2","DOIUrl":"https://doi.org/10.1007/978-3-319-93411-2_2","url":null,"abstract":"","PeriodicalId":268358,"journal":{"name":"International Conference on Detection of intrusions and malware, and vulnerability assessment","volume":"47 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-06-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124727392","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
BINARM: Scalable and Efficient Detection of Vulnerabilities in Firmware Images of Intelligent Electronic Devices 智能电子设备固件映像中可扩展且高效的漏洞检测
Paria Shirani, L. Collard, B. Agba, Bernard Lebel, M. Debbabi, Lingyu Wang, Aiman Hanna
{"title":"BINARM: Scalable and Efficient Detection of Vulnerabilities in Firmware Images of Intelligent Electronic Devices","authors":"Paria Shirani, L. Collard, B. Agba, Bernard Lebel, M. Debbabi, Lingyu Wang, Aiman Hanna","doi":"10.1007/978-3-319-93411-2_6","DOIUrl":"https://doi.org/10.1007/978-3-319-93411-2_6","url":null,"abstract":"","PeriodicalId":268358,"journal":{"name":"International Conference on Detection of intrusions and malware, and vulnerability assessment","volume":"25 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-06-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129656377","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 36
Evasive Malware via Identifier Implanting 通过标识符植入规避恶意软件
Rui Tanabe, Wataru Ueno, Kou Ishii, K. Yoshioka, Tsutomu Matsumoto, Takahiro Kasama, D. Inoue, C. Rossow
{"title":"Evasive Malware via Identifier Implanting","authors":"Rui Tanabe, Wataru Ueno, Kou Ishii, K. Yoshioka, Tsutomu Matsumoto, Takahiro Kasama, D. Inoue, C. Rossow","doi":"10.1007/978-3-319-93411-2_8","DOIUrl":"https://doi.org/10.1007/978-3-319-93411-2_8","url":null,"abstract":"","PeriodicalId":268358,"journal":{"name":"International Conference on Detection of intrusions and malware, and vulnerability assessment","volume":"112 ","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-06-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"120868557","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
No Random, No Ransom: A Key to Stop Cryptographic Ransomware 没有随机,没有赎金:阻止加密勒索软件的关键
Ziya Alper Genç, G. Lenzini, P. Ryan
{"title":"No Random, No Ransom: A Key to Stop Cryptographic Ransomware","authors":"Ziya Alper Genç, G. Lenzini, P. Ryan","doi":"10.1007/978-3-319-93411-2_11","DOIUrl":"https://doi.org/10.1007/978-3-319-93411-2_11","url":null,"abstract":"","PeriodicalId":268358,"journal":{"name":"International Conference on Detection of intrusions and malware, and vulnerability assessment","volume":"48 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-06-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128191332","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 27
Update State Tampering: A Novel Adversary Post-compromise Technique on Cyber Threats 更新状态篡改:一种针对网络威胁的新型对手妥协后技术
Sungjin Kim, B. Kim, H. Kim, Dong Hoon Lee
{"title":"Update State Tampering: A Novel Adversary Post-compromise Technique on Cyber Threats","authors":"Sungjin Kim, B. Kim, H. Kim, Dong Hoon Lee","doi":"10.1007/978-3-319-93411-2_7","DOIUrl":"https://doi.org/10.1007/978-3-319-93411-2_7","url":null,"abstract":"","PeriodicalId":268358,"journal":{"name":"International Conference on Detection of intrusions and malware, and vulnerability assessment","volume":"30 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-06-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132689548","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Knockin' on Trackers' Door: Large-Scale Automatic Analysis of Web Tracking 敲开跟踪器的门:大规模的网络跟踪自动分析
Iskander Sánchez-Rola, I. Santos
{"title":"Knockin' on Trackers' Door: Large-Scale Automatic Analysis of Web Tracking","authors":"Iskander Sánchez-Rola, I. Santos","doi":"10.1007/978-3-319-93411-2_13","DOIUrl":"https://doi.org/10.1007/978-3-319-93411-2_13","url":null,"abstract":"","PeriodicalId":268358,"journal":{"name":"International Conference on Detection of intrusions and malware, and vulnerability assessment","volume":"66 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-06-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117301174","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 19
Bytecode Corruption Attacks Are Real - And How to Defend Against Them 字节码损坏攻击是真实的-以及如何防御它们
Taemin Park, Julian Lettner, Yeoul Na, Stijn Volckaert, M. Franz
{"title":"Bytecode Corruption Attacks Are Real - And How to Defend Against Them","authors":"Taemin Park, Julian Lettner, Yeoul Na, Stijn Volckaert, M. Franz","doi":"10.1007/978-3-319-93411-2_15","DOIUrl":"https://doi.org/10.1007/978-3-319-93411-2_15","url":null,"abstract":"","PeriodicalId":268358,"journal":{"name":"International Conference on Detection of intrusions and malware, and vulnerability assessment","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-06-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133564535","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Hidden in Plain Sight: Filesystem View Separation for Data Integrity and Deception 隐藏在普通视线:文件系统视图分离的数据完整性和欺骗
Teryl Taylor, F. Araujo, Anne Kohlbrenner, M. Stoecklin
{"title":"Hidden in Plain Sight: Filesystem View Separation for Data Integrity and Deception","authors":"Teryl Taylor, F. Araujo, Anne Kohlbrenner, M. Stoecklin","doi":"10.1007/978-3-319-93411-2_12","DOIUrl":"https://doi.org/10.1007/978-3-319-93411-2_12","url":null,"abstract":"","PeriodicalId":268358,"journal":{"name":"International Conference on Detection of intrusions and malware, and vulnerability assessment","volume":"53 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-06-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115302513","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Malrec: Compact Full-Trace Malware Recording for Retrospective Deep Analysis Malrec:紧凑型全跟踪恶意软件记录回顾性深度分析
Giorgio Severi, T. Leek, Brendan Dolan-Gavitt
{"title":"Malrec: Compact Full-Trace Malware Recording for Retrospective Deep Analysis","authors":"Giorgio Severi, T. Leek, Brendan Dolan-Gavitt","doi":"10.1007/978-3-319-93411-2_1","DOIUrl":"https://doi.org/10.1007/978-3-319-93411-2_1","url":null,"abstract":"","PeriodicalId":268358,"journal":{"name":"International Conference on Detection of intrusions and malware, and vulnerability assessment","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-06-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121763574","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 37
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信